New Stories

From FRAUD CONTROL

Lanck Telecom Raises Fraud Alarm for International Brands, Enterprise Call Centers & Carriers: Beware of Wangiri 2.0

interview with Sergey Okhrimenko

Lanck Telecom Raises Fraud Alarm for International Brands, Enterprise Call Centers & Carriers: Beware of Wangiri 2.0

An international wholesaler gives details about a new traffic pumping fraud dubbed Wangiri 2.0.  The fraud is hard to detect and targets businesses who do lots of international calling.

From SECURITY

Allot’s Mobile Security: Network-based Protection that 21 Million Consumers & SMBs Subscribe to — at One Euro a Month

interview with Moshe Elias

Protecting mobile users from online threats is a major opportunity for telecoms and a service very much in demand.  Learn about the adoption, challenges, and marketing innovations driving mobile device cybersecurity protection.

From FRAUD CONTROL

A Black Swan Solution Guide: The Value of an Authoritative Database of Global Telephone Numbers in Fraud Control

interview with

Learn about an authoritative database of allocated numbers and special number ranges in every country of the world.  The expert explains how this database adds value to any FMS or fraud analyst team.

More Stories

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services From SECURITY

How Thales Embeds Comms Security for Electronic OEMs & Telecoms Delivering Next Generation IoT Systems & Services

interview with Stephen Spellicy

How high-speed communications, advanced security and analytics technology gets delivered to the IoT OEMs and telecom providers.  Learn why security, performance, cost and reliability are key IoT challenges.

From REVENUE ASSURE

A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow

interview with Carla Cardoso & Bernado Lucas & Thomas Steagall

Leading risk management consultants explain their mission and walk-through RA, subscription fraud, and collections cases.  They also explain how analytics and machine learning can supplement process optimization.

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients From SECURITY

Subex Exploits its Deep Research of Global IoT Threats to Win Telecom, Industrial, and Automotive OEM Clients

interview with Kiran Zachariah

A leader in IoT security monitoring and protection services explains the many challenges of IoT security and how his firm is exploiting its deep research and honeypots to protect telecom, industrial, and automotive OEM clients.

Moments Matter in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers From FRAUD CONTROL

Moments Matter in Blocking Identity Fraud: Why Number Porting Data is a Vital Tool in Stopping Account Takeovers

interview with Kathy Timko

Matching the porting history of a telephone number to a carrier of record is now crucial to identity/credit checks by financial, healthcare, and other firms in the U.S. Learn how fraudsters exploit carrier porting processes to perform account takeover in 10 minutes; and why freshly updated porting data is needed to combat $17 billion in identity fraud.

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight From FRAUD CONTROL

In the Era of Telecom Security Breaches, Mobileum Brings Signaling’s Deep Detection Capability to the Fraud Fight

interview with Miguel Carrero

Security-breach-driven fraud is on the increase as fraudsters gain deeper  knowledge of telecom spheres such as roaming.  Using five fraud cases, an expert shows how advanced signaling techniques are taking fraud control to a higher level.

PrologMobile’s Simple and Brilliant Plan to Save US MNOs Billions a Year in Recovered Phones & Retained Customers
From REVENUE ASSURE

PrologMobile’s Simple and Brilliant Plan to Save US MNOs Billions a Year in Recovered Phones & Retained Customers

interview with Seth Heine

An expert in the mobile phone reverse supply chain explains how MNOs — via a neutral third party information exchange — can recover their original phones on the used market and save huge sums in multi-year customer retention.

Black Swan Solution Guide: The IPRN Database and its Use in IRSF & Wangiri Fraud Control From FRAUD CONTROL

Black Swan Solution Guide: The IPRN Database and its Use in IRSF & Wangiri Fraud Control

interview with Dan Baker & Colin Yates

The IPRN Database is a powerful new tool for helping control IRSF and Wangiri frauds.  The pioneer of the category explains the value and use of the IPRN Database in this 14-page Black Swan Solution Guide.

Black Swan Solution Guides & Papers

Other Recent Stories